Novell Groupwise 2014

CPE Details

Novell Groupwise 2014
2014
2019-06-11 15:12 +00:00
2019-06-11 15:12 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:novell:groupwise:2014:-:*:*:*:*:*:*

Informations

Vendor

novell

Product

groupwise

Version

2014

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2016-5760 2017-04-20 15:00 +00:00 Multiple cross-site scripting (XSS) vulnerabilities in the administrator console in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 allow remote attackers to inject arbitrary web script or HTML via the (1) token parameter to gwadmin-console/install/login.jsp or (2) PATH_INFO to gwadmin-console/index.jsp.
6.1
MEDIUM
CVE-2016-5761 2017-04-20 15:00 +00:00 Cross-site scripting (XSS) vulnerability in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 allows remote attackers to inject arbitrary web script or HTML via a crafted email.
6.1
MEDIUM
CVE-2016-5762 2017-04-20 15:00 +00:00 Integer overflow in the Post Office Agent in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 might allow remote attackers to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
9.8
CRITICAL
CVE-2014-0610 2014-09-04 23:00 +00:00 The client in Novell GroupWise before 8.0.3 HP4, 2012 before SP3, and 2014 before SP1 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.
10
CVE-2014-0600 2014-08-29 08:00 +00:00 FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.
7.8
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.